Understand the Concepts of the Internet, Intranet, and Extranet



Similar documents
1.3 Understand VLANs, Wired LANs, and Wireless LANs. 1.5 Understand Wide Area Network Connections

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of

Understand Wide Area Networks (WANs)

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

WS_FTP: The smarter way to transfer files

Remote Access Policy HS 9453-D

Network Configuration Settings

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Remote Services. Managing Open Systems with Remote Services

S. No. Type of Information Document Data. Date Version Nature of Change Author. Referred Policies, Procedures & Forms

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Network Security Topologies. Chapter 11

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

VPN. Date: 4/15/2004 By: Heena Patel

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

8. Firewall Design & Implementation

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

Useful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs

introducing The BlackBerry Collaboration Service

Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Secure Network Design: Designing a DMZ & VPN

Intranet, Extranet, Firewall

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

What would you like to protect?

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Five Phases. The History of the Internet and World-Wide-Web. Long Distance LAN. internet. Internet. Tool Building

Security Controls What Works. Southside Virginia Community College: Security Awareness

UCIT INFORMATION SECURITY STANDARDS

AAA Driving Programs Teen Driving Seminar Supporting Materials

Standard: Network Security

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

Embracing Complete BYOD Security with MDM and NAC

IT 3202 Internet Working (New)

SCADA/Business Network Separation: Securing an Integrated SCADA System

SCADA SYSTEMS AND SECURITY WHITEPAPER

Cisco Which VPN Solution is Right for You?

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Distributed Processing. The Internet and the New Information Technology Infrastructure. Reasons for Implementing Distributed Systems

Unit- I Introduction and Web Development Strategies

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

The New York Society Library Presents:

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

we secure YOUR network we secure network security English network security

MANAGED SECURITY SERVICES

Manage a Firewall Using your Plesk Control Panel Contents

Computer Networking. Definitions. Introduction

Cornerstones of Security

Solutions to Trust. NEXThink V5 What is New?

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

CareGiver Remote Support Information Technology FAQ

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Instant Messaging. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz

Gaining Competitive Advantage Through Internet Business Solutions. 1999, Cisco Systems, Inc.

Troubleshooting GeneMapper ID-X Software for HID Laboratories. AFDAA Meeting Austin, TX Feb, 2013

ereview Security Overview Security Overview

Technical papers Virtual private networks

Medical Information Technology Services Business Partner Connection Policy 05- APRIL -2011

RSA SecurID Ready Implementation Guide

CHAPTER 15 FDOT INTERNET REQUIREMENTS

The TCP/IP Reference Model

Immotec Systems, Inc. SQL Server 2005 Installation Document

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Tolling Systems Security. Ken Philmus Xerox Transportation Services

DMZ Network Visibility with Wireshark June 15, 2010

Car Costs ASSESSMENT ONE: Assessment #1

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Architecture Guidelines Application Security

The Internet and HTML. Jen Golbeck College of Information Studies University of Maryland

Case Study for Layer 3 Authentication and Encryption

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Masters of Science in Information Technology

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929,

Implementing a Microsoft Windows 2000 Network Infrastructure

MS Managing and Maintaining Windows 8

NAS 322 Connecting Your NAS to a VPN

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Project Charter and Scope Statement

WS_FTP. Addressing the Need for Secure File Transfer

Access Control in Home Networking

Running head: Cloud Computing and its Future. Fernandez 1. Cloud Computing and its Future

4.7 Website Privacy Policy

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

Setting up VPN Access for Remote Diagnostics Support

Transcription:

Understand the Concepts of the Internet, Intranet, and Extranet

Lesson Overview In this lesson, you will learn about: The Internet Intranets Extranets VPN Security Zones Firewalls

Anticipatory Set: 1. Discuss how the Internet was created by the US Department of Defense, when the project started, and the impact it has had on society 2. Discuss the uses of a virtual private network (VPN) and relate sample situations where it is used

In 1962 ARPA opened a computer research program and appointed an MIT scientist named John Licklider to lead it. He had just published his first memorandum on the "Galactic Network" concept... a futuristic vision where computers would be networked together and would be accessible to everyone. In October 1969, Internet messaging programs (IMPs) were installed in computers at both UCLA and Stanford. UCLA students would 'login' to Stanford's computer, access its databases and try to send data.

The experiment was successful and the fledgling network had come into being By December 1969 ARPANET comprised four host computers with the addition of research centers in Santa Barbara and Utah This was the beginning of the Internet

Access to the Internet was now available and it was hypertext document servers and Mosaic, the graphical browser, that became the killer application that made the Internet popular and useful to the general public This worldwide computer network allows people to communicate and exchange information The Internet is not owned by any particular company or person

Intranet A private network based on Internet protocols such as TCP/IP but designed for information management within a company or organization One of the key advantages of an intranet is the broad availability and use of software applications unique to the needs of a corporation It is also a computer network and includes some of the same technologies as the Internet

Intranet uses include providing access to software applications; document distribution; software distribution; access to databases; and training An intranet is so named because it looks like a World Wide Web site and is based on the same technologies, yet is strictly internal and confidential to the organization and is not connected to the Internet proper Some intranets also offer access to the Internet, but such connections are directed through a firewall that protects the internal network from the external Web

Extranet An extension of some combination of corporate, public, and private intranet using World Wide Web technology to facilitate communication with the corporation s suppliers, customers, and associates An extranet allows customers, suppliers, and business partners to gain limited access to a company s intranet in order to enhance the speed and efficiency of their business relationship

VPN Virtual private network are nodes (nodes are a connection point, either a redistribution point or a communication endpoint (some terminal equipment) on a public network They communicate among themselves using encryption so that their messages are safe from being intercepted by unauthorized users VPNs operate as if the nodes were connected by private lines. An example would be teachers at home needing limited access to the school district s intranet would be given VPN software for their personal laptop

Security Zone Business/organization's need for physical and logical boundaries for accessing, controlling, and securing information throughout an organization's network The security zone contains hidden settings for how Microsoft Windows and Internet Explorer manage unsigned controls Security changes daily. A must to keep aware of the updates. Check the webcasts where leading security and privacy experts in field discuss the issues. Microsoft has webcasts covering Security Bulletins, Security Development Lifecycle, Security Intelligence Report, Security Tools, and more

Firewall A computer system or network firewall is designed to permit authorized communications while blocking unauthorized access The device is configured to permit or deny computer applications based upon a set of rules and other criteria Firewalls are technological barriers designed to prevent unauthorized or unwanted communications between computer networks or hosts

Discuss how the business would achieve creating security zones through the use of firewalls and VPNs for their intranet and extranets.

Class Activity Student Activity 1.1: Comparing Internet, Intranet, Extranet Discuss in groups of three how our subject applies: 1. As an example use the DMV (Department of Motor Vehicles): Us as customers (driver s license renewal & vehicle registration renewal) Internet Highway Patrol as suppliers (vehicle ticket information) & as business partners (they request current vehicle registration information) DMV extranet & their own intranet Smog check stations as suppliers (they provide smog certificates direct to DMV) VPN to DMV extranet Auto dealers as business partners (new car registration) VPN to DMV extranet & their own intranet 2. Think and list examples of businesses that would use the same technology

Lesson Review Work in small groups (3-4 students) to complete the network design activity from Networking Fundamentals Student Activity NetFund_SA_1.1_1 and Student Activity NetFund_SA_1.1_2 If time permits, informally present group designs to the class. Discuss the different designs created.